Cyber Security Cybersecurity

Sophos shares five signs of ransomware attacks

In a series of articles, cybersecurity solutions firm Sophos breaks down the threats of ransomware and indicators of potential attacks. The security research unit of the firm pored over loads of ransomware attacks that allowed them to come up with a list that would help organizations in mitigating any possible breach.

Sophos’ Peter Mackenzie said in a blog post that during investigations of reported incidents, they look back through the telemetry records over the previous week or two leading up to the day of the attack.

“These records sometimes include behavioral anomalies that (on their own) may not be inherently malicious, but in the context of an attack that has already taken place, could be taken as an early indicator of a threat actor conducting operations on the victim’s network,” Mackenzie said.

Sophos discovers Emotet malware back in action after brief hiatus

Paying ransom twice more costly than data recovery expenses

Experienced hackers use “legitimate admin tools” to infiltrate a network and if they cannot, the most inconspicuous machines that are connected to the network would do.

Mackenzie shared the following indicators organizations should look out for in order to avoid or prevent ransomware attacks.

A network scanner, especially on a server.
Attackers typically start by gaining access to one machine where they search for information: Is this a Mac or Windows, what’s the domain and company name, what kind of admin rights does the computer have, and more. Next, attackers will want to know what else is on the network and what can they access. The easiest way to determine this is to scan the network. If a network scanner, such as AngryIP or Advanced Port Scanner, is detected, question admin staff. If no one cops to using the scanner, it is time to investigate.

Tools for disabling antivirus software.
Once attackers have admin rights, they will often try to disable security software using applications created to assist with the forced removal of software, such as Process Hacker, IOBit Uninstaller, GMER, and PC Hunter. These types of commercial tools are legitimate, but in the wrong hands, security teams and admins need to question why they have suddenly appeared.

The presence of MimiKatz
Any detection of MimiKatz anywhere should be investigated. If no one on an admin team can vouch for using MimiKatz, this is a red flag because it is one of the most commonly used hacking tools for credential theft. Attackers also use Microsoft Process Explorer, included in Windows Sysinternals, a legitimate tool that can dump LSASS.exe from memory, creating a .dmp file. They can then take this to their own environment and use MimiKatz to safely extract user names and passwords on their own test machine.

Patterns of suspicious behavior
Any detection happening at the same time every day, or in a repeating pattern is often an indication that something else is going on, even if malicious files have been detected and removed. Security teams should ask “why is it coming back?” Incident responders know it normally means that something else malicious has been occurring that hasn’t (as of yet) been identified.

Test attacks
Occasionally, attackers deploy small test attacks on a few computers in order to see if the deployment method and ransomware executes successfully, or if security software stops it. If the security tools stop the attack, they change their tactics and try again. This will show their hand, and attackers will know their time is now limited. It is often a matter of hours before a much larger attack is launched.